ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "Juniper Researchstart=20start=20start=30start=10start=20"

  • A 7-Step Risk Assessment Framework For Cybersecurity Professionals

    Sponsored by: VikingCloud

    Cybersecurity threats are on the rise, with 78% more breaches in the U.S. in 2023. This white paper outlines a 7-step risk assessment framework to help cybersecurity professionals identify critical assets, assess vulnerabilities, mitigate risks, and build cyber resilience. Read the full white paper to learn more.

  • Computer Weekly – 7 August 2018: How digital is driving golf to the connected course

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how one of the most traditional of sports, golf, is turning to technology to engage a new audience and build the connected course. Industry legend Stephanie 'Steve' Shirley discusses skills, diversity in tech and Brexit fears. And we assess four of the biggest cloud storage providers. Read the issue now.

  • Cloud Market Report Australia

    Sponsored by: TechTarget ComputerWeekly.com

    What is the state of Australia's cloud market? Inside this market report, industry experts share their thoughts on how the key players measure up and find out how Bendigo Bank, Frisk, Pizza Hut, RMIT Online, Unit4 are maximising their cloud investments.

  • Domain Name System (DNS) Security

    Sponsored by: Cisco

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

  • Has HP taken a calculated risk in splitting the business?

    Sponsored by: TechTarget ComputerWeekly.com

    Hewlett Packard (HP) is planning to turn its consumer computing and printing departments into a separate company. The remaining business would comprise HP's software, business servers and IT services operations.

  • CW Innovation Awards: SIA taps blockchain for loyalty app

    Sponsored by: TechTarget ComputerWeekly.com

    In this case study, learn how Singapore Airlines expanded its blockchain-based digital wallet, Kris+, into a broader digital lifestyle platform.

  • Quarterly Ransomware Research Report

    Sponsored by: CyberMaxx

    This Q2 2024 ransomware report reveals a continued rise in attacks, with Dispossessor, Lockbit, Ransomhub and 2 other groups accounting for nearly 40% of the activity. Learn how to reduce your organization's risk by reading the full "Quarterly Ransomware Research Report."

  • Containers and storage 101: The fundamentals of container storage

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

  • A Computer Weekly buyer's guide to applications of next-generation networking

    Sponsored by: TechTarget ComputerWeekly.com

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

  • CW Middle East ezine July 2018

    Sponsored by: TechTarget ComputerWeekly.com

    What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.